Asset Management and Data Security

Equipment theft for asset managers goes far beyond the loss of a smartphone, laptop, or server; valuable data and other components are stolen in tandem. Employees, visitors, vendors and contractors are the typical perpetrators, and mobile devices, like tablets and other portable wireless items, are most commonly taken. Often, while active hardware is secure, equipment scheduled to be destroyed or recycled is the most vulnerable.

A combination of an accurate inventory list, physical security, and employee education is recommended by experts as the most effective combatant of data and equipment theft. This strategy is similar to that of EnaSys, which utilizes inventory reporting, labels/scanners, software, and personnel training for its equipment and data security solutions.

Fun fact: Using an EnaSys asset tracking system, Visa audits in six hours what took them 168 hours previously.